Search Results - (( its application sensor algorithm ) OR ( _ application security algorithm ))*

Refine Results
  1. 1
  2. 2

    On Clustering Algorithm Of Coverage Area Problems In Wireless Sensor Networks by Ismail Abdullah, Kalid Abdlkader Marsal

    Published 2024
    “…Wireless sensor networks (WSN) has applications in many areas such as in surveillance, healthcare, national security, military and environmental monitoring. …”
    Article
  3. 3

    Feasibility of PKC in resource-constrained wireless sensor networks by Pathan, Al-Sakib Khan, Hong, Choong Seon

    Published 2008
    “…By this time, several works have proved that the lightweight versions of many well-known public key algorithms can be utilized in WSN environment. With the expense of a little energy, public key based schemes could in fact be the best choice for ensuring data security in high-security demanding WSN applications. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    Public key cryptography in resource-constrained WSN by Pathan, Al-Sakib Khan, Hong, Choong Seon

    Published 2008
    “…By this time, several works have proved that the lightweight versions of many well-known public key algorithms can be utilized in WSN environment. With the expense of a little energy, public key based schemes could in fact be the best choice for ensuring data security in high-security demanding WSN applications. …”
    Get full text
    Get full text
    Monograph
  5. 5
  6. 6

    An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network by Ramli, Sofia Najwa

    Published 2016
    “…While the result of FFT algorithm summarizes that the number of the common FFT peak location index for sensors on the same subject is significantly higher compared to the number of common feature for sensors on different subjects.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Simulation and Design of an Intelligent Mobile Robot for Fire Fighting by Chor, Keong Seng

    Published 2003
    “…A method of Path Recognition Algorithms (PRA) providing robots the autonomous ability to judge purpose of action likes human base on the input sensors from the environment. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Internet of things security vulnerabilities and recommended solutions by Olanrewaju, Rashidah Funke, Khan, Burhan ul Islam, Anwar, Farhat, Mir, Roohie Naaz

    Published 2018
    “…As observed from the review work, providing security for such networks is in its young stage in the form of an integrated architecture offering perfect security together with network and application possibilities although the shortcomings of IEFT and IEEE contribute more towards the same. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring by Al-Mekhlafi, Mohamed Abdulkarem Taher

    Published 2021
    “…Simulation and experiments are performed to validate the design concept of LTDMA scheme and evaluate the sensor node's throughput, power consumption and the efficiency of the proposed embedded algorithms for SHM applications. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…To date, this research found no known practical implementation of the AAḃ algorithm to prove or to validate its efficiency on a real-world computing platform. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Smart room system with dual authentication by Harun, Muhammad Hazmi, Abdul Rahid@Abdul Rashid, Nurul Najwa

    Published 2025
    “…A numeric keypad for password entry after face verification, a solenoid sensor for door locking, an LED light that can be controlled remotely via a mobile application, a buzzer for detecting failed attempts, and a DHT11 sensor for humidity and temperature monitoring inside the smart room are all equipment of additional IoT hardware. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems by Khalid, Haqi, Hashim, Shaiful Jahari, Syed Ahmad Abdul Rahman, Sharifah Mumtazah, Hashim, Fazirulhisyam, Chaudhary, Muhammad Akmal

    Published 2021
    “…The proposed scheme extends the Kerberos workflow and utilizes the AES-ECC algorithm for efficient encryption keys management and secure communication between the edge nodes and fog node servers to establish secure mutual authentication. …”
    Get full text
    Get full text
    Article
  15. 15

    Comparison Of Ridge Filters Performance in Human Vein Extraction Using 850nm Near Infrared Led Illumination by Abu Bakar Abd Rahman, Abdullah Bade, Fuei, Pien Chee

    Published 2023
    “…Vein pattern recognition has gained significant attention in recent years due to its potential applications in various fields such as biometrics, medical diagnosis, and security systems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  16. 16
  17. 17

    Obstacle Avoidance of a Mobile Robot Using Fuzzy Logic Control by Eshtawie, Mohamed Al-Mahdi

    Published 1999
    “…The controller will have its inputs from the sensors that will be mounted on the robot. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20